[go: up one dir, main page]

CN107659362A - A kind of full light steganography method based on ASE noises and Wavelength-encoding phase-modulation - Google Patents

A kind of full light steganography method based on ASE noises and Wavelength-encoding phase-modulation Download PDF

Info

Publication number
CN107659362A
CN107659362A CN201710883306.XA CN201710883306A CN107659362A CN 107659362 A CN107659362 A CN 107659362A CN 201710883306 A CN201710883306 A CN 201710883306A CN 107659362 A CN107659362 A CN 107659362A
Authority
CN
China
Prior art keywords
wavelength
wss
signal
ase
modulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710883306.XA
Other languages
Chinese (zh)
Inventor
纪越峰
王骋
王宏祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201710883306.XA priority Critical patent/CN107659362A/en
Publication of CN107659362A publication Critical patent/CN107659362A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/50Transmitters
    • H04B10/516Details of coding or modulation
    • H04B10/548Phase or frequency modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/25Arrangements specific to fibre transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2602Signal structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Optical Communication System (AREA)

Abstract

本发明公开了一种以ASE噪声作为载波的多比特波长编码相位调制全光隐写方法,通过WSS将ASE噪声按照波长分配码字分配到各个输出端口形成各路子载波,再用经过“串并变换”或“取反”操作后的相应数据序列对各路子载波进行相位调制的手段,既实现了秘密信号在时域、频域上的隐藏,又在保证授权用户通信可靠性的同时也提高了系统的频谱利用率。而且实现简单,具有良好的可扩展性,密钥空间容量也大大增加了。

The invention discloses a multi-bit wavelength coded phase modulation all-optical steganography method using ASE noise as a carrier. The ASE noise is distributed to each output port according to the wavelength distribution codeword through WSS to form each sub-carrier. The method of phase-modulating each subcarrier with the corresponding data sequence after the operation of "conversion" or "inversion" not only realizes the hiding of secret signals in the time domain and frequency domain, but also improves the reliability of authorized user communication while ensuring the communication reliability of authorized users. The spectrum utilization of the system is improved. Moreover, it is simple to implement, has good scalability, and the capacity of the key space is also greatly increased.

Description

一种基于ASE噪声和波长编码相位调制的全光隐写方法An all-optical steganography method based on ASE noise and wavelength-coded phase modulation

技术领域technical field

本发明涉及光网络物理层安全领域,所提的是一种以ASE(amplifiedspontaneous emission)噪声作为载波的波长编码相位调制全光隐写系统。该系统主要用在全光网络中密级较高信息的隐藏传输。The invention relates to the field of optical network physical layer security, and provides a wavelength-coded phase-modulated all-optical steganography system using ASE (amplifiedspontaneous emission) noise as a carrier. This system is mainly used in the hidden transmission of high-level information in all-optical networks.

背景技术Background technique

全光网络以其高传输带宽、高处理速率等潜在优势,已经逐渐代替了传统的光电网络,成为干线通信网的首选技术。光网络作为整个通信系统中的物理链路层,因其传输介质封闭绝缘,抗电磁干扰能力强等特点,在传统上被认为有较高的安全性保障。但随着各种破坏、窃听技术与设备的进步和发展,以及近年来针对光网络遭到破坏与攻击的事件不断被曝光,使得光网络具有先天安全性的成见正被逐步打破。而且光网络在传输、交换、控制和管理等方面的研究和设计更多考虑的是透明开放和互联互通,从源头上缺乏对安全保密需求的关注和研究,而这种开放性导致光网络容易受到攻击。另一方面,传统的信息安全技术,主要集中于高层的加密协议,但高层的安全机制需要建立在底层安全的基础之上,因此物理层安全是整个通信安全的第一道屏障,能够为整个通信网提供不可替代的安全保障。With its potential advantages such as high transmission bandwidth and high processing rate, all-optical networks have gradually replaced traditional optical networks and become the preferred technology for trunk communication networks. As the physical link layer in the entire communication system, the optical network is traditionally considered to have relatively high security guarantees due to its characteristics of closed and insulated transmission media and strong anti-electromagnetic interference capabilities. However, with the progress and development of various sabotage and eavesdropping technologies and equipment, and incidents of sabotage and attacks on optical networks have been exposed in recent years, the prejudice that optical networks have inherent security is gradually being broken. Moreover, the research and design of optical networks in terms of transmission, switching, control, and management are more concerned with transparency, openness, and interconnection. From the source, there is a lack of attention and research on security and confidentiality requirements, and this openness makes optical networks easy. being attacked. On the other hand, traditional information security technologies mainly focus on high-level encryption protocols, but high-level security mechanisms need to be built on the basis of low-level security. Therefore, physical layer security is the first barrier for the entire communication security. The communication network provides an irreplaceable security guarantee.

目前已经提出的全光加密方法是先将要传输的原始数据加密成密文(如通过异或逻辑运算等),再经过调制后在光纤链路中传输,只有当接收者掌握了正确的密钥,才能通过解调恢复出原始数据。目前的加密方法大多数采用的是分组加密,窃听者如果记录了较长时间的密文信息,就有可能通过统计方法破解密钥,从而攻击整个系统。混沌加密是利用发送端与接收端混沌系统的同步,将发送端混沌系统的参数作为密钥。混沌加密方法虽然有较大的密钥空间,但对发送、接收端系统参量的一致性要求很高,只要有很小的失配,可能就很难建立起混沌同步,因此鲁棒性较差。另一方面,这些加密方法都没有实现秘密信息的隐藏传输,给秘密信息的安全性带来隐患。量子密钥分配是通过单光子分配密钥,与“一次一密”加密方式相结合能够保证私密信号的绝对安全。但是受到单光子传输系统中噪声和严重衰减的限制,其传输速率和传输距离都很小。The all-optical encryption method that has been proposed so far is to first encrypt the original data to be transmitted into ciphertext (such as through XOR logic operations, etc.), and then transmit it in the optical fiber link after modulation. Only when the receiver has the correct key , the original data can be recovered through demodulation. Most of the current encryption methods use block encryption. If an eavesdropper records the ciphertext information for a long time, it is possible to crack the key through statistical methods, thereby attacking the entire system. Chaotic encryption uses the synchronization of the chaotic system at the sending end and the receiving end, and uses the parameters of the chaotic system at the sending end as the key. Although the chaotic encryption method has a large key space, it has high requirements on the consistency of the sending and receiving end system parameters. As long as there is a small mismatch, it may be difficult to establish chaotic synchronization, so the robustness is poor . On the other hand, these encryption methods do not realize the hidden transmission of secret information, which brings hidden dangers to the security of secret information. Quantum key distribution is to distribute keys through single photons, combined with the "one-time pad" encryption method to ensure the absolute security of private signals. However, limited by the noise and serious attenuation in the single photon transmission system, its transmission rate and transmission distance are very small.

全光隐写技术是将要传输的秘密信号隐藏在公共信道和系统噪声中,也就是除了发送用户和授权接收者以外,没有人知道秘密信号的存在,从而更能保证秘密信号的传输安全。早期的全光隐写方法是利用超短光脉冲作为载波,调制后的光信号通过群速度色散或频谱相位编码等方法,在时域上被充分拉伸,峰值功率大幅度下降直至低于系统噪声的功率,这样信号就淹没在了噪声中。在接收端,只有采用正确的色散补偿或者频谱相位反编码,才能解调恢复出原始信号。但是,这些全光隐写方法只是实现了秘密信号在时域上的隐藏,在频域上由于载波的频谱宽度比噪声的谱宽窄得多,而且功率谱的峰值比噪声大很多,窃听者通过光谱仪很容易发现秘密信号,所以在频域上并没有实现隐藏。为了解决这个问题,最好的方法就是直接利用系统噪声作为载波来传输秘密信号。All-optical steganography is to hide the secret signal to be transmitted in the public channel and system noise, that is, no one knows the existence of the secret signal except the sending user and the authorized receiver, so that the transmission security of the secret signal can be guaranteed. The early all-optical steganography method used ultrashort optical pulses as the carrier, and the modulated optical signal was fully stretched in the time domain through methods such as group velocity dispersion or spectral phase encoding, and the peak power dropped significantly until it was lower than the system The power of the noise so that the signal is drowned in the noise. At the receiving end, the original signal can only be demodulated and restored by correct dispersion compensation or spectral phase inverse coding. However, these all-optical steganography methods only realize the hiding of secret signals in the time domain. In the frequency domain, since the spectral width of the carrier is much narrower than that of the noise, and the peak value of the power spectrum is much larger than the noise, the eavesdropper can pass Spectrometers can easily find secret signals, so there is no hiding in the frequency domain. In order to solve this problem, the best way is to directly use the system noise as the carrier to transmit the secret signal.

于是近年来出现了以ASE噪声作为载波的全光隐写方法。2013年,美国普林斯顿大学的Ben Wu等人利用ASE噪声相干长度较短的特征,提出了以发送端马赫增德尔干涉仪(MZI)两臂光程差作为密钥的相位调制方法,只有在接收端用MZI正确地补偿发送端两臂的光程差,再利用相干检测的方法才能解调出原始数据信号。为了进一步增强秘密信号的安全性,该系统采用可调谐光纤延迟线(OTDL)产生可动态改变的光程差,即动态密钥。但是,OTDL的调谐速率很慢,通常在秒的量级,如果窃听者具有快速搜索技术,当他搜索到密钥的平均时间小于系统密钥改变的周期时,就能通过相干解调获取部分原始数据信息。So in recent years, an all-optical steganography method using ASE noise as a carrier has emerged. In 2013, Ben Wu et al. from Princeton University in the United States took advantage of the short coherence length of ASE noise to propose a phase modulation method using the optical path difference between the two arms of the Mach-Zehnder Interferometer (MZI) at the transmitting end as the key. The end uses MZI to correctly compensate the optical path difference between the two arms of the sending end, and then uses the method of coherent detection to demodulate the original data signal. In order to further enhance the security of the secret signal, the system uses a tunable optical delay line (OTDL) to generate a dynamically changeable optical path difference, that is, a dynamic key. However, the tuning rate of OTDL is very slow, usually on the order of seconds. If the eavesdropper has a fast search technology, when the average time for him to search for the key is less than the period of the system key change, he can obtain part of it through coherent demodulation. raw data information.

因此,为了进一步加强系统的安全性,需要设计一个可快速重构密钥的隐写方法。2014年,中国解放军理工大学光子信息技术实验室的Huatao Zhu等人提出了一种以波长选择开关(WSS)的波长分配码字作为密钥的互补编码光隐写系统。由于WSS具有微秒级的可重构时间,可以实现密钥的快速重构。经过互补编码和强度调制的ASE噪声无论在时域和频域上都与原始的ASE噪声类似,但是在一个比特周期内,调制后的ASE信号只占据了WSS一半的波长通道,如果窃听者能够用光谱仪记录多个不同比特周期时调制信号的频谱,就能发现秘密信号的存在并破解波长分配码字,进而获取秘密数据信号。除此之外,该方法在一个时钟周期里,用WSS的所有频隙通道只传输了一个比特的数据信息,频谱利用率较低。Therefore, in order to further strengthen the security of the system, it is necessary to design a steganographic method that can quickly reconstruct the key. In 2014, Huatao Zhu et al. from the Photon Information Technology Laboratory of PLA University of Science and Technology proposed a complementary coded optical steganographic system using the wavelength allocation codeword of the wavelength selective switch (WSS) as the key. Since WSS has microsecond-level reconfigurable time, it can realize fast reconfiguration of keys. The ASE noise after complementary coding and intensity modulation is similar to the original ASE noise in both the time domain and the frequency domain, but in a bit period, the modulated ASE signal only occupies half of the wavelength channel of the WSS, if the eavesdropper can By using a spectrometer to record the frequency spectrum of the modulated signal at multiple different bit periods, the existence of the secret signal can be discovered and the wavelength allocation codeword can be cracked, so as to obtain the secret data signal. In addition, this method uses all frequency slot channels of the WSS to transmit only one bit of data information in one clock cycle, and the spectrum utilization rate is low.

综上分析和比较,目前现有的全光隐写方法都有各自的优点和不足。需要设计一个在能在时域、频域上同时实现秘密信号的隐藏、具有能快速动态改变密钥的特性、并且频谱利用率较大的隐写方法。本发明针对上面提出的问题,提出了一种基于ASE噪声的多比特波长编码相位调制光隐写方法。Based on the above analysis and comparison, the existing all-optical steganography methods have their own advantages and disadvantages. It is necessary to design a steganography method that can hide secret signals in both time domain and frequency domain, has the characteristics of fast and dynamic key changes, and has a large spectrum utilization rate. Aiming at the problems raised above, the present invention proposes an ASE noise-based multi-bit wavelength code phase modulation optical steganography method.

发明内容Contents of the invention

本发明设计了一种利用ASE噪声作为载波的多比特波长编码相位调制光隐写方法。图1给出了N比特波长编码相位调制方法的示意图。该方法利用WSS对ASE噪声进行波长编码后产生2N路子载波,将待传输的秘密数据信号经过串并转换、取反操作后分别对2N路子载波信号进行相位调制,并利用OTDL(可调谐光纤延迟线)和VOA(可变光衰减器)控制,使这2N路调制后的子载波达到时域上的同步和功率的近似相等,然后与公共信道上的信号耦合后一起在光纤中传输。在接收端,授权接收用户用WSS选出相应的波长通道,再利用相干解调才能恢复相应位的原始数据信号。该方法既能使经过编码调制后的ASE噪声在任何时段都能覆盖WSS的所有波长通道,又能在保证授权用户通信可靠性和安全性的前提下,增大频谱利用率。除此之外,相比于原有的互补编码强度调制方法,该方法的密钥空间大大增加了。The invention designs a multi-bit wavelength coding phase modulation optical steganography method using ASE noise as a carrier. FIG. 1 shows a schematic diagram of an N-bit wavelength-coded phase modulation method. This method uses WSS to encode the wavelength of ASE noise to generate 2N sub-carriers, and performs phase modulation on the 2N sub-carrier signals after serial-to-parallel conversion and inversion operations on the secret data signals to be transmitted, and uses OTDL (tunable fiber delay Line) and VOA (Variable Optical Attenuator) control, so that the 2N modulated subcarriers achieve synchronization in the time domain and approximately equal power, and then are coupled with the signal on the common channel and transmitted in the optical fiber. At the receiving end, the authorized receiving user uses WSS to select the corresponding wavelength channel, and then uses coherent demodulation to restore the original data signal of the corresponding bit. This method can not only make the coded and modulated ASE noise cover all wavelength channels of WSS at any time, but also increase the spectrum utilization rate under the premise of ensuring the communication reliability and security of authorized users. In addition, compared with the original complementary coding intensity modulation method, the key space of this method is greatly increased.

针对所述的第一点,即经过波长编码和相位调制后的ASE噪声在任何时段都能覆盖WSS的所有波长通道,具体说明如下:Regarding the first point mentioned above, that is, the ASE noise after wavelength encoding and phase modulation can cover all wavelength channels of WSS at any time, the specific instructions are as follows:

该方法中,ASE噪声在WSS的每个波长通道内的分量都会产生一个时变相移,这个相移是由波长分配码字和相应的数据序列决定。这个相移并不会改变该波长通道分量的功率谱,因此调制后的ASE信号的频谱与原始ASE信号类似,能够覆盖WSS的所有波长通道。In this method, the ASE noise component in each wavelength channel of the WSS will generate a time-varying phase shift, which is determined by the wavelength allocation codeword and the corresponding data sequence. This phase shift does not change the power spectrum of the wavelength channel component, so the spectrum of the modulated ASE signal is similar to the original ASE signal, and can cover all wavelength channels of the WSS.

针对所述的第二点,即在保证授权用户通信可靠性和安全性的前提下,增大频谱利用率,具体说明如下:For the second point mentioned above, that is, to increase the spectrum utilization rate under the premise of ensuring the communication reliability and security of authorized users, the specific instructions are as follows:

相比于单比特的波长编码系统,多比特波长编码相位调制系统能在一个时钟周期里,用WSS的所有波长通道传输了多个比特的数据信息,频谱利用率得到了提高。另一方面,每路子载波功率也降低了,降低的子载波功率可以通过增大掺饵光纤放大器(EDFA)的增益系数G进行补偿。虽然增大增益系数G会引入更多的额外噪声(未经过调制的ASE噪声),但是当调制的ASE载波功率值大于-10dBm时,也就是以拍频噪声为主时,调制后的ASE信号经过EDFA放大后信噪比的恶化程度与EDFA的增益系数G无关。因此,授权接收者的解调质量与单比特系统的解调质量几乎相同,所以,该系统在增大频谱利用率的同时,并没有对授权用户通信的可靠性带来威胁。Compared with the single-bit wavelength coding system, the multi-bit wavelength coding phase modulation system can use all the wavelength channels of the WSS to transmit multiple bits of data information in one clock cycle, and the spectrum utilization rate has been improved. On the other hand, the power of each subcarrier is also reduced, and the reduced subcarrier power can be compensated by increasing the gain coefficient G of the erbium-doped fiber amplifier (EDFA). Although increasing the gain factor G will introduce more additional noise (unmodulated ASE noise), when the modulated ASE carrier power value is greater than -10dBm, that is, when the beat frequency noise is dominant, the modulated ASE signal After EDFA amplification, the deterioration degree of SNR has nothing to do with the gain coefficient G of EDFA. Therefore, the demodulation quality of the licensed receiver is almost the same as that of the single-bit system, so the system does not threaten the reliability of the licensed user's communication while increasing the spectrum utilization.

针对所述的第三点,即相比于原有的互补编码强度调制方法,该方法的密钥空间大大增加了,具体说明如下:Regarding the third point mentioned above, that is, compared with the original complementary coding intensity modulation method, the key space of this method is greatly increased, and the specific description is as follows:

该方法中,即使窃听者知道了系统中存在传输的秘密信号,要想解调秘密信号,他也需要知道具体的“密钥”。密钥不仅包括WSS的波长分配码字,还包括发送端对应支路的延迟线长度。密钥由原来的一维空间变为二维空间,密钥空间的容量大大增加了。除此之外,WSS可能的波长分配码字也因多比特的引入而得到了扩展。对于N比特波长编码系统,波长分配码字将WSS的M个波长通道随机分到2N路,每路包含个波长通道,其可能的选取种数为相比于单比特互补编码系统的大大提高了。In this method, even if the eavesdropper knows that there is a secret signal transmitted in the system, he needs to know the specific "key" in order to demodulate the secret signal. The key includes not only the wavelength allocation codeword of the WSS, but also the delay line length of the corresponding branch at the sending end. The key changes from the original one-dimensional space to the two-dimensional space, and the capacity of the key space is greatly increased. In addition, the possible wavelength allocation codewords of WSS have also been expanded due to the introduction of multiple bits. For an N-bit wavelength coding system, the wavelength allocation codeword randomly divides the M wavelength channels of the WSS into 2N channels, and each channel contains wavelength channels, the number of possible selections is Compared to the single-bit complementary coding system's greatly improved.

针对经过波长编码后的每一路ASE子载波的相位调制和相干解调,具体说明如下:For the phase modulation and coherent demodulation of each ASE subcarrier after wavelength encoding, the specific instructions are as follows:

对于经过波长编码后的每一路ASE子载波,都是宽谱信号,相干长度很短,因此不能采用传统连续波的相位调制和延迟干涉的解调方法,这类宽谱载波的相位调制和解调原理如图2所示。在发送端,载波先通过MZI(马赫增德尔干涉仪)分为功率相等的上、下两个支路,在其中一条支路上引入光纤延迟线LX,再用数据对该支路的载波信号进行相位调制。为了使调制后的ASE信号与原始的ASE噪声有相似的光谱,引入光纤延迟线的长度LX要大于ASE噪声的相干长度Lc(372um)。否则上、下两支路的光信号会相干叠加,对于相同的光程差,不同的波长会产生不同的干涉结果,这样会改变原始ASE噪声的光谱。在图2中,发送端MZI上支路是“相位调制载波”,下支路是“未调制载波”。在接收端,用MZI在另一支路引入光纤延迟线LR,来补偿发送端MZI上下支路(即“相位调制载波”和“未调制载波”)的光程差。当满足|LX-LR|<Lc时,“相位调制载波”和“未调制载波”相干,即可利用相干检测(例如零差平衡接收)的方法解调出数字信号。For each ASE subcarrier after wavelength encoding, it is a wide-spectrum signal with a very short coherence length, so the traditional continuous wave phase modulation and delay interference demodulation method cannot be used. The phase modulation and solution of this kind of wide-spectrum carrier The tuning principle is shown in Figure 2. At the sending end, the carrier wave is first divided into upper and lower branches with equal power by MZI (Mach-Zehnder Interferometer), and an optical fiber delay line L X is introduced into one of the branches, and then the carrier signal of the branch is used with data Perform phase modulation. In order to make the modulated ASE signal have a similar spectrum to the original ASE noise, the length L X of the introduced fiber delay line should be greater than the coherence length L c (372um) of the ASE noise. Otherwise, the optical signals of the upper and lower branches will coherently superimpose. For the same optical path difference, different wavelengths will produce different interference results, which will change the spectrum of the original ASE noise. In FIG. 2 , the upper branch of the MZI at the transmitting end is "phase-modulated carrier", and the lower branch is "unmodulated carrier". At the receiving end, MZI is used to introduce a fiber delay line LR in another branch to compensate the optical path difference between the upper and lower branches of the MZI at the sending end (namely "phase-modulated carrier" and "unmodulated carrier"). When |L X -L R |<L c is satisfied, the "phase-modulated carrier" and the "unmodulated carrier" are coherent, and the digital signal can be demodulated by coherent detection (such as homodyne balanced reception).

综上所述,本发明利用光网络中的ASE噪声作为载波传输秘密信号,同时实现了秘密信号在时域、频域上的隐藏,采用能快速改变的动态密钥,在保证授权用户通信可靠性的同时也提高了系统的频谱利用率。该方法实施简单、成本较低,在光网络中可用于密级较高信号的保密通信。In summary, the present invention utilizes the ASE noise in the optical network as the carrier to transmit the secret signal, and at the same time realizes the hiding of the secret signal in the time domain and the frequency domain, adopts a dynamic key that can be changed quickly, and ensures the reliable communication of authorized users. At the same time, it also improves the spectrum utilization of the system. The method is simple to implement and low in cost, and can be used for secure communication of signals with higher confidentiality in optical networks.

附图说明Description of drawings

图1 N比特波长编码相位调制隐写方法的示意图。Fig.1 Schematic diagram of N-bit wavelength-encoded phase modulation steganography method.

图2每一路ASE子载波的相位调制/相干检测方法示意图。Fig. 2 is a schematic diagram of a phase modulation/coherent detection method for each ASE subcarrier.

图3二比特波长编码相位调制隐写方法的示意图。Fig. 3 is a schematic diagram of a two-bit wavelength coded phase modulation steganography method.

具体实施方式Detailed ways

为了使本发明的目的、技术方法及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the purpose, technical method and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

实施:Implementation:

本实施例是基于如图3所示的二比特波长编码相位调制全光隐写系统,其中的WSS包含了96个波长通道。主要说明私密信号实现隐藏通信的过程。本实施的具体工作流程如下:This embodiment is based on the two-bit wavelength-coded phase-modulated all-optical steganography system shown in FIG. 3 , where the WSS includes 96 wavelength channels. It mainly explains the process of secret signal to realize hidden communication. The specific workflow of this implementation is as follows:

1.将WSS的96个波长通道按照四个波长分配码字(假设从上到下依次是code1,code2,code3和code4)分配给4路信号,每路包含24个波长通道;1. Allocate the 96 wavelength channels of WSS to 4 channels of signals according to four wavelengths (assuming code1, code2, code3 and code4 from top to bottom), each channel contains 24 wavelength channels;

2.系统的ASE噪声经过WSS波长编码后形成4路ASE子载波(假设从上到下依次是第1,2,3,4路子载波),每路子载波信号经过上支路带有光纤延迟线和相位调制器的MZI,如图2所示。假设从上到下4路载波中MZI引入的光纤延迟线的长度分别是LX1,LX2,LX3和LX42. The ASE noise of the system is encoded by the WSS wavelength to form 4 ASE subcarriers (assuming that they are the 1st, 2nd, 3rd, and 4th subcarriers from top to bottom), and each subcarrier signal passes through the upper branch with a fiber delay line and the MZI of the phase modulator, as shown in Figure 2. Assume that the lengths of the fiber delay lines introduced by MZI in the 4 carriers from top to bottom are L X1 , L X2 , L X3 and L X4 respectively;

3.将待传输的秘密数据经过串并变换后产生奇数位{b2k}和偶数位{b2k+1}两个子序列,这两个子序列经过逐位取反后又产生两个新序列,用这4个序列分别对4路子载波进行相位调制(例如用{b2k+1}调制第1路子载波;调制第2路子载波;{b2k}调制第3路子载波;调制第4路子载波);3. After serial-to-parallel conversion of the secret data to be transmitted, two subsequences of odd bits {b 2k } and even bits {b 2k+1 } are generated, and these two subsequences are reversed bit by bit to generate with Two new sequences, use these 4 sequences to phase modulate the 4 subcarriers respectively (for example, use {b 2k+1 } to modulate the 1st subcarrier; Modulate the second subcarrier; {b 2k } modulate the third subcarrier; Modulating the 4th sub-carrier);

4.将分别经过波长编码和相位调制后的子载波信号通过VOA(使各子载波调制信号的功率近似相等)和OTDL(使各子载波调制信号达到是域同步),再通过两个50:50耦合器耦合成调制后的ASE噪声信号;4. Pass the sub-carrier signals after wavelength encoding and phase modulation respectively through VOA (to make the power of each sub-carrier modulation signal approximately equal) and OTDL (to make each sub-carrier modulation signal reach domain synchronization), and then pass through two 50: A 50 coupler is coupled into a modulated ASE noise signal;

5.将调制后的ASE噪声信号通过耦合器与公共信道的信号耦合,然后一起在光纤中传输;5. Coupling the modulated ASE noise signal with the signal of the public channel through a coupler, and then transmitting together in the optical fiber;

6.在接收端,因为公共信道的载波是连续光,而且功率远高于ASE噪声,公共信道直接利用对应的解调方法就可以实现解调(即如果公共信道采用的是强度调制,接收端就用直接检测的方法解调,如果采用的是相位调制,接收端采用延迟干涉的方法解调);6. At the receiving end, because the carrier of the public channel is continuous light, and the power is much higher than the ASE noise, the public channel can directly use the corresponding demodulation method to achieve demodulation (that is, if the public channel uses intensity modulation, the receiving end Just use the method of direct detection to demodulate, if phase modulation is used, the receiving end adopts the method of delay interference to demodulate);

7.对于秘密信号,授权接收者需要根据发送端的波长分配码字,用与发送端相同配置的WSS选择出code1和code3对应的波长通道,并且要过滤掉公共信道占用的波长通道(公共信道的载波是连续光,只占用1个波长通道)。然后准确地匹配第1路和第3路子载波发送端MZI引入的光程差,最后利用零差平衡检测的方法实现相位解调,经过并串转换后恢复出原始数据。7. For secret signals, the authorized receiver needs to assign codewords according to the wavelength of the sender, select the wavelength channels corresponding to code1 and code3 with the WSS configured the same as the sender, and filter out the wavelength channels occupied by public channels (public channel’s The carrier is continuous light and only occupies 1 wavelength channel). Then accurately match the optical path difference introduced by the MZI at the sending end of the first and third subcarriers, and finally use the homodyne balance detection method to realize phase demodulation, and restore the original data after parallel-to-serial conversion.

Claims (4)

1. a kind of more bit Wavelength-encoding phase modulated light steganography methods based on ASE noises, main process is included (with N-bit Exemplified by Wavelength-encoding phase modulation system):
A. it is 2N subcarriers by ASE noises are produced in EDFA by WSS points;
B. to each subcarriers, the data sequence corresponding to carries out phase-modulation, and the signal after then each road is modulated is coupled into " signal ASE ";
C. in receiving terminal, authorized receiver is using similarly configuring with transmitting terminal identical Wavelength Assignment code word and with transmitting terminal WSS, the respective wavelength channel selecting for modulating each bit is come out, then tick-tack is recovered after demodulated and parallel serial conversion.
2. method as claimed in claim 1, WSS M wavelength channel is randomly assigned WSS's according to Wavelength Assignment code word 2N output port, the subcarrier of each port output includeIndividual wavelength channel.
3. method as claimed in claim 1, initial data is obtained into 2N subsequence by serial to parallel conversion and after negating computing {bNk},{bNk+1},…,{bNk+(k-1)AndPhase is carried out to 2N subcarriers respectively Modulation.2N roads modulated signal reaches the approximately equal of power spectrum and temporal synchronization by VOA and OTDL, then passes through coupler " signal ASE " after synthesis modulation.
4. method as claimed in claim 1, with the WSS similarly configured with transmitting terminal N number of output port, it will be used to modulate respectively Sequence { bNk},{bNk+1},…,{bNk+(k-1) Individual wavelength channel chooses.The method of coherent demodulation is recycled to obtain phase The Serial No. answered, then by recovering secret data signal after parallel serial conversion.
CN201710883306.XA 2017-09-26 2017-09-26 A kind of full light steganography method based on ASE noises and Wavelength-encoding phase-modulation Pending CN107659362A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710883306.XA CN107659362A (en) 2017-09-26 2017-09-26 A kind of full light steganography method based on ASE noises and Wavelength-encoding phase-modulation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710883306.XA CN107659362A (en) 2017-09-26 2017-09-26 A kind of full light steganography method based on ASE noises and Wavelength-encoding phase-modulation

Publications (1)

Publication Number Publication Date
CN107659362A true CN107659362A (en) 2018-02-02

Family

ID=61115884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710883306.XA Pending CN107659362A (en) 2017-09-26 2017-09-26 A kind of full light steganography method based on ASE noises and Wavelength-encoding phase-modulation

Country Status (1)

Country Link
CN (1) CN107659362A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114268471A (en) * 2021-12-10 2022-04-01 中国科学院声学研究所南海研究站 Optical time domain stealth and encryption device for optical communication system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101156207A (en) * 2005-04-13 2008-04-02 皇家飞利浦电子股份有限公司 Encode with watermark before phase modulation
CN106788767A (en) * 2016-12-16 2017-05-31 北京邮电大学 A kind of full optical modulation formats conversion methods of QPSK to the BPSK based on Phase sensitive amplification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101156207A (en) * 2005-04-13 2008-04-02 皇家飞利浦电子股份有限公司 Encode with watermark before phase modulation
CN106788767A (en) * 2016-12-16 2017-05-31 北京邮电大学 A kind of full optical modulation formats conversion methods of QPSK to the BPSK based on Phase sensitive amplification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHENG WANG: "Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise", 《OPTICS COMMUNICATIONS》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114268471A (en) * 2021-12-10 2022-04-01 中国科学院声学研究所南海研究站 Optical time domain stealth and encryption device for optical communication system
CN114268471B (en) * 2021-12-10 2022-10-14 中国科学院声学研究所南海研究站 Optical time domain stealth and encryption device for optical communication system

Similar Documents

Publication Publication Date Title
US7333611B1 (en) Ultra-secure, ultra-efficient cryptographic system
US8180052B2 (en) Data communication apparatus
CA2973284C (en) Communication with everlasting security from short-term-secure encrypted quantum communication
Wu et al. Channel-based dynamic key generation for physical layer security in OFDM-PON systems
US11641241B2 (en) Optical communication system using mode-locked frequency comb and all-optical phase encoding for spectral and temporal encrypted and stealthy transmission, and for optical processing-gain applications
US8107628B2 (en) Data transmitting apparatus and data receiving apparatus
US8615087B2 (en) OCDM-based photonic encryption system with provable security
Wu et al. Joint security enhancement and PAPR mitigation for OFDM-NOMA VLC systems
Sultan et al. Chaotic distribution of QAM symbols for secure OFDM signal transmission
Hussien et al. Design and performance analysis of secure optical communication system by implementing blowfish cipher algorithm
US20080181329A1 (en) Data transmitting apparatus and data receiving apparatus
Wang et al. Data center secure communication via DNA hyperchaotic encryption
Zhang et al. Physical layer security based on chaotic spatial symbol transforming in fiber-optic systems
Al‐Moliki et al. Chaos‐based physical‐layer encryption for ofdm‐based vlc schemes with robustness against known/chosen plaintext attacks
Xu et al. Diffusion-assisted quantum noise stream cipher for physical layer security in UFMC
CN107659362A (en) A kind of full light steganography method based on ASE noises and Wavelength-encoding phase-modulation
Bhanja et al. Novel encryption technique for security enhancement in optical code division multiple access
CN119544177B (en) An encrypted communication method and system based on bio-genetic coding chaos drive
US7835524B2 (en) Encrypting of communications using a transmitting/receiving apparatus via key information based on a multi-level code signal and a pseudo-random number sequence for modulation with an information signal
JP2007511178A (en) Quantum cryptography based on coherent state via wavelength division multiplexing communication network with optical amplification
Dai et al. Orthogonal DPSK/CSK modulation and public-key cryptography-based secure optical communication
Lin et al. Photonics-based physical encryption and decryption for secure data transmission leveraging the Talbot effect
JP2006333138A (en) Data transmission device, data reception device, and data communication device
Venugopalan et al. Signal theory based encryption of faster-than-Nyquist signals for fiber and wireless transmission
US20080056405A1 (en) Data communication apparatus and data communication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180202

WD01 Invention patent application deemed withdrawn after publication